Sciweavers

9401 search results - page 232 / 1881
» Wireless Networks
Sort
View
186
Voted
SUTC
2006
IEEE
15 years 11 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
JNW
2008
116views more  JNW 2008»
15 years 5 months ago
The Tiny Agent - Wireless Sensor Networks Controlling Energy Resources
CSIRO is using wireless sensor network technology to deploy "tiny agents", working as autonomous controllers for individual pieces of electrical load/generation equipment...
Glenn Platt, Joshua Wall, Philip Valencia, John K....
180
Voted
IDEAS
2002
IEEE
223views Database» more  IDEAS 2002»
15 years 10 months ago
Energy-Efficient Data Broadcasting in Mobile Ad-Hoc Networks
Energy saving is the most important issue in wireless mobile computing due to power constraints on mobile units. Data broadcasting is the main method of information dissemination ...
Le Gruenwald, Muhammad Javed, Meng Gu
COMSWARE
2008
IEEE
15 years 11 months ago
Experimental analysis of RSSI-based location estimation in wireless sensor networks
—With a widespread increase in the number of mobile wireless systems and applications, the need for location aware services has risen at a very high pace in the last few years. M...
Mohit Saxena, Puneet Gupta, Bijendra N. Jain
INFOCOM
2006
IEEE
15 years 11 months ago
Stimulating Participation in Wireless Community Networks
—Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. We focus on the provision of Internet access to mobile users ...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...